بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
241
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
منشور في 2023"…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
242
Single channel speech denoising by DDPG reinforcement learning agent
منشور في 2025"…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …"
-
243
Short-Term Load Forecasting in Active Distribution Networks Using Forgetting Factor Adaptive Extended Kalman Filter
منشور في 2023"…A few research studies focused on developing data filtering algorithm for the load forecasting process using approaches such as Kalman filter, which has good tracking capability in the presence of noise in the data collection process. …"
-
244
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …"
-
245
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
منشور في 2020"…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. …"
احصل على النص الكامل
-
246
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
منشور في 2024"…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …"
-
247
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. The rapid increase in the use of online platforms for job posting has resulted in fraudulent advertising. …"
-
248
-
249
Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review
منشور في 2023"…A higher level of accuracy (99%) was found in studies that used support vector machine, decision trees, and k-means clustering algorithms. </p><h3>Conclusions </h3><p dir="ltr">This review presents an overview of studies based on AI models and algorithms used to predict and diagnose pancreatic cancer patients. …"
-
250
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
منشور في 2020"…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …"
احصل على النص الكامل
-
251
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
252
Investigation of Forming a Framework to shortlist contractors in the tendering phase
منشور في 2022"…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …"
احصل على النص الكامل
-
253
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
منشور في 2024"…<h3>Background and Motivations</h3><p dir="ltr">Physiological signals, such as the Photoplethysmogram (PPG) collected through wearable devices, consistently encounter significant motion artifacts. Current signal processing techniques, and even state-of-the-art machine learning algorithms, frequently struggle to effectively restore the inherent bodily signals amidst the array of randomly generated distortions. …"
-
254
Information warfare. (c2015)
منشور في 2015"…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
255
-
256
-
257
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
منشور في 2025"…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …"
-
258
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
259
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…<p dir="ltr">The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. …"
-
260
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
منشور في 2019احصل على النص الكامل
doctoralThesis